Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How A Media Collaboration Platform Transforms Paid Media Campaigns

Anyone who's worked on paid media campaigns knows the chaos. You're juggling feedback from five different people across three time zones, the latest creative is buried somewhere in an email thread from Tuesday, and nobody's quite sure if the numbers in that spreadsheet are from yesterday or last week. It's exhausting, and it slows everything down.

The Importance of Connected Physical Security: A Q&A with Brivo's Aaron Wang

In a recent episode of the Talk LP News podcast, host Amber Bradley sat down with Aaron Wang, Senior Global Accounts Manager at Brivo, to dive into the current state of physical security in retail. Their conversation went beyond simple solutions, exploring the limitations of disconnected “patchwork” security systems and highlighting the benefits of a holistic, cloud-based approach.

How Exabeam Detects LLM Abuse for Google Cloud Model Armor

In this demo, see how the Exabeam New-Scale Security Operations Platform integrates with Google Cloud Model Armor to detect and stop abuse of large language models (LLMs). You’ll learn how Exabeam: Monitors AI activity for suspicious or malicious behavior Uses advanced analytics to spot LLM misuse in real time Helps security teams enforce responsible AI use policies Watch how Exabeam and Google Cloud work together to provide stronger visibility, detection, and protection against emerging threats targeting LLMs.

WP.29 and Beyond: Global Trends in Automotive IoT Cybersecurity 2025

The automotive industry is undergoing a historic transformation. As vehicles become increasingly connected, autonomous, and software-defined—including the rise of connected cars, autonomous vehicles, and advanced driver assistance systems—cybersecurity has shifted from a technical afterthought to a regulatory requirement. At the heart of this transformation lies UN Regulation No.

Master export control regulations for 2025: Effortless compliance strategies

When considering the interconnected global economy, navigating export control regulations is more critical than ever for businesses involved in international trade. These regulations are designed to protect national security, support foreign policy objectives, and prevent sensitive technologies from falling into the wrong hands. However, the increasing complexity of these rules, combined with evolving geopolitical landscapes, can make compliance challenging.

AI-Generated Attacks: What are They and How to Avoid Them?

AI-generated attacks, such as social engineering, phishing, deepfakes, malicious GPTs, data poisoning, and more, are disrupting the current security landscape speedily. But there are ways to avoid them and strengthen our defences with miniOrange IAM solutions.